What Sets Edge Computing Apart? Customizing Physical Infrastructure for Maximum Impact
CXOTech Magazine
by cxomagazine
3d ago
By Emily Newton is a tech journalist with over five years of experience covering how technology is changing industry and business. Keep up with Emily by connecting with her on LinkedIn Edge computing promises to revolutionize the way many industries operate. It will usher in a new era of connectivity, take automation to new heights and finally make self-driving cars a reality. In order to get there, though, you have to consider edge computing infrastructure. This side of edge computing is easy to overlook, but it is important not to. Physical factors make a much bigger difference wh ..read more
Visit website
The Evolution and Importance of Cybersecurity in the Digital Age
CXOTech Magazine
by cxomagazine
1w ago
By Jeffery Squibb, Information Security Administrator/Infrastructure Lead, SoutheastHEALTH In an era where the digital landscape is continuously evolving, Cybersecurity has become paramount for individuals, businesses, and governments worldwide. This article delves into the evolution of Cybersecurity, its current state, the challenges and strategies involved in safeguarding digital assets, and a look into the future of this ever-important field. Anyone can trace the journey of Cybersecurity back to the 1970s with the development of the Advanced Research Projects Agency Network (ARPANET), the ..read more
Visit website
Optimizing the Future: MLOps vs DevOps in the Industrial Revolution
CXOTech Magazine
by cxomagazine
2w ago
By Neha Purohit, Vice President, Data and Analytics, United Talent Agency Introduction Two paradigms are leading this change in an era where industry and technology have combined to create previously unheard-of growth and innovation: MLOps and DevOps. The differentiation and convergence of these techniques serve as the cornerstone for upcoming breakthroughs as we manage the complexity of the Industrial Revolution. They go beyond simple operational tactics. This article thoroughly explores the differences between MLOps and DevOps, highlighting their distinct functions, complementary qualities ..read more
Visit website
Redefining Cyber Risk for Modern Information Security Programs
CXOTech Magazine
by cxomagazine
3w ago
By Lester Godsey, Chief Information Security Officer, Maricopa County The following is the definition of cyber risk, per ChatGPT: “. . . the potential harm or damage that can arise from the use of technology and information systems, particularly in the context of cybersecurity. It encompasses the likelihood of a cyber threat exploiting vulnerabilities in an organization’s systems, networks, or digital assets, leading to adverse consequences.” While this characterization of cyber risk certainly holds true today, there are some factors in play that should make organizations rethink how they def ..read more
Visit website
“Computing at the Rugged Edge” – IT’s Role in Leveraging Edge Computing for Mobile Microgrids
CXOTech Magazine
by cxomagazine
3w ago
By John Chavner, Director, Technology and Cloud Development, VoltaGrid Introduction: Revolutionizing Power Generation through Mobility The world of power generation has long been associated with massive stationary infrastructure, such as power plants and substations. However, in recent years, a silent revolution has been unfolding in the energy sector. It’s a transformation that involves harnessing the power of mobility, data, and edge computing to create dynamic and responsive energy solutions. VoltaGrid, a company born from the intersection of innovation and necessity, stands as a testament ..read more
Visit website
RPA is Undead
CXOTech Magazine
by cxomagazine
3w ago
By Igor Tosic, Managing Director – Global Head of Application & Data Architecture, Brown Brothers Harriman Introduction: The recent pronouncements by industry leaders UiPath and Automation Anywhere on the demise of the term “Robotic Process Automation” (RPA) have sparked debates about the true nature of RPA’s existence. In the subsequent discussion, I will delve into the historical context of RPA, its evolution from mainframe screen scraping technologies, and the emergence of its latest variant, named “Integrated Automation,” as another iteration of the same technology. We should question ..read more
Visit website
Transforming Learning with AI: An Imperative for Educators
CXOTech Magazine
by cxomagazine
3w ago
By Brandie Shatto, Program Director & Professor | Educational Technology, University of Maryland Global Campus In the ongoing debate over the use of generative artificial intelligence (AI) in education, there are mixed feelings. Some are hesitant about adopting AI, feeling anxious about the rapid pace at which these technologies are advancing and uncertain about the questions that have yet to be answered when it comes to responsible use of AI. Others have been using, experimenting with, and advocating for its adoption since OpenAI’s ChatGPT first burst onto the scene. In this technologica ..read more
Visit website
Regionalization of Cyber Security Defense
CXOTech Magazine
by cxomagazine
3w ago
My Experience as Regional Cyber Security Chief for the US Army Regional Network Center By Gary Trautmann, Senior Cyber Security Advisor to Mongolian Armed Forces Cyber Command, Sincerus Global What is regionalization and/or centralizing efforts? This is an initiative that brings assets into a unique location to enhance oversight and control of efforts. In cyber security, it is an effort to provide better security and reduce the possible ‘weak’ links in the chain that could provide a vulnerability for exploitation. When I was hired in 2022 as the Chief of Cyber Security for the Northeast Regio ..read more
Visit website
TRAINING THE TRANSLATORS: WHY BUSINESS SCHOOLS NEED TO UP THEIR AI GAME
CXOTech Magazine
by cxomagazine
3w ago
By Steven Keith Platt, Director of Analytics and Lecturer of Applied AI and Statistics, Quinlan School of Business, Loyola University Chicago The outlook for the AI industry is outstanding and organizations continue to ramp up their investments. Yet many encounter issues in reaching their AI aspirations. This can be attributable to factors such as a failure to adequately address AI risks, lagging digitization efforts, and HR concerns. However, the most challenging are those related to organizational issues. To address this, business schools need to focus on educating their students to become ..read more
Visit website
A Dive Into The TPRM Landscape
CXOTech Magazine
by cxomagazine
3w ago
By Carmine Valente, CISSP | CISM | CISA, Vice President of Information Security at Paramount Global Corporate organizations have historically been characterized by various interconnected business environments, often relying on third-party providers and partners to enhance efficiency and streamline operations. While these collaborations are essential to day-to-day business operations, bringing numerous benefits, they also expose companies to a myriad of risks. In the past few years, third-party risk management (TPRM) has emerged as a critical aspect of risk management, allowing organizations t ..read more
Visit website

Follow CXOTech Magazine on FeedSpot

Continue with Google
Continue with Apple
OR